메뉴 건너뛰기




Volumn 4246 LNAI, Issue , 2006, Pages 317-331

Deciding key cycles for security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTATIONAL COMPLEXITY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33845189681     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11916277_22     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and Ph. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 2:103-127, 2002.
    • (2002) Journal of Cryptology , vol.2 , pp. 103-127
    • Abadi, M.1    Rogaway, Ph.2
  • 2
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • Proc. 10th European Symposium on Research in Computer Security (ESORICS'05)
    • P. Adlo, G. Bana, J. Herzog, and A. Scedrov. Soundness of formal encryption in the presence of key-cycles. In Proc. 10th European Symposium on Research in Computer Security (ESORICS'05), volume 3679 of LNCS, pages 374-396, 2005.
    • (2005) LNCS , vol.3679 , pp. 374-396
    • Adlo, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - Crypto '93, 13th Annual International Cryptology Conference
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto '93, 13th Annual International Cryptology Conference, volume 773 of LNCS, pages 232-249, 1993.
    • (1993) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 35248878042 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), April
    • B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of LNCS, April 2003.
    • (2003) LNCS , vol.2620
    • Blanchet, B.1    Podelski, A.2
  • 9
    • 27244438198 scopus 로고    scopus 로고
    • A symbolic decision procedure for cryptographic protocols with time stamps
    • LNCS, London, England. Springer-Verlag
    • L. Bozga, C. Ene, and Y. Lakhnech. A symbolic decision procedure for cryptographic protocols with time stamps. In Proc. 15th International Conference on Concurrency Theory (CONCUR'04), LNCS, pages 177-192, London, England, 2004. Springer-Verlag.
    • (2004) Proc. 15th International Conference on Concurrency Theory (CONCUR'04) , pp. 177-192
    • Bozga, L.1    Ene, C.2    Lakhnech, Y.3
  • 12
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • Proc. of the 14th Int. Conf. on Rewriting Techniques and Applications (RTA'2003). Springer-Verlag, June
    • H. Comon-Lundh and V. Cottier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In Proc. of the 14th Int. Conf. on Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS, pages 148-164. Springer-Verlag, June 2003.
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cottier, V.2
  • 17
    • 33745776339 scopus 로고    scopus 로고
    • (De)compositions of cryptographic schemes and their applications to protocols
    • R. Janvier, Y. Lakhnech, and L. Mazare. (De)Compositions of Cryptographic Schemes and their Applications to Protocols. Cryptology ePrint Archive, Report 2005/020, 2005.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.20
    • Janvier, R.1    Lakhnech, Y.2    Mazare, L.3
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96). Springer-Verlag, March
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pages 147-166. Springer-Verlag, March 1996.
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 21
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC'04)
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, pages 133-151, 2004.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 25
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions and composed keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science, 299:451-475, 2003.
    • (2003) Theoretical Computer Science , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.